3 * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
4 * COPYING RESTRICTIONS APPLY, see COPYRIGHT file
11 #include <ac/stdlib.h>
13 #include <ac/socket.h>
14 #include <ac/string.h>
19 #define LDAP_OPT_REBIND_PROC 0x4e814d
20 #define LDAP_OPT_REBIND_PARAMS 0x4e814e
22 static const LDAPAPIFeatureInfo features[] = {
23 #ifdef LDAP_API_FEATURE_X_OPENLDAP
24 { /* OpenLDAP Extensions API Feature */
25 LDAP_FEATURE_INFO_VERSION,
27 LDAP_API_FEATURE_X_OPENLDAP
31 #ifdef LDAP_API_FEATURE_THREAD_SAFE
32 { /* Basic Thread Safe */
33 LDAP_FEATURE_INFO_VERSION,
35 LDAP_API_FEATURE_THREAD_SAFE
38 #ifdef LDAP_API_FEATURE_SESSION_THREAD_SAFE
39 { /* Session Thread Safe */
40 LDAP_FEATURE_INFO_VERSION,
41 "SESSION_THREAD_SAFE",
42 LDAP_API_FEATURE_SESSION_THREAD_SAFE
45 #ifdef LDAP_API_FEATURE_OPERATION_THREAD_SAFE
46 { /* Operation Thread Safe */
47 LDAP_FEATURE_INFO_VERSION,
48 "OPERATION_THREAD_SAFE",
49 LDAP_API_FEATURE_OPERATION_THREAD_SAFE
52 #ifdef LDAP_API_FEATURE_X_OPENLDAP_REENTRANT
53 { /* OpenLDAP Reentrant */
54 LDAP_FEATURE_INFO_VERSION,
55 "X_OPENLDAP_REENTRANT",
56 LDAP_API_FEATURE_X_OPENLDAP_REENTRANT
59 #if defined( LDAP_API_FEATURE_X_OPENLDAP_THREAD_SAFE ) && \
60 defined( LDAP_THREAD_SAFE )
61 { /* OpenLDAP Thread Safe */
62 LDAP_FEATURE_INFO_VERSION,
63 "X_OPENLDAP_THREAD_SAFE",
64 LDAP_API_FEATURE_X_OPENLDAP_THREAD_SAFE
67 #ifdef LDAP_API_FEATURE_X_OPENLDAP_V2_REFERRALS
69 LDAP_FEATURE_INFO_VERSION,
70 "X_OPENLDAP_V2_REFERRALS",
71 LDAP_API_FEATURE_X_OPENLDAP_V2_REFERRALS
83 struct ldapoptions *lo;
85 /* Get pointer to global option structure */
86 lo = LDAP_INT_GLOBAL_OPT();
88 return LDAP_NO_MEMORY;
91 if( lo->ldo_valid != LDAP_INITIALIZED ) {
92 ldap_int_initialize(lo, NULL);
96 assert( LDAP_VALID( ld ) );
98 if( !LDAP_VALID( ld ) ) {
99 return LDAP_OPT_ERROR;
102 lo = &ld->ld_options;
105 if(outvalue == NULL) {
106 /* no place to get to */
107 return LDAP_OPT_ERROR;
111 case LDAP_OPT_API_INFO: {
112 struct ldapapiinfo *info = (struct ldapapiinfo *) outvalue;
115 /* outvalue must point to an apiinfo structure */
116 return LDAP_OPT_ERROR;
119 if(info->ldapai_info_version != LDAP_API_INFO_VERSION) {
120 /* api info version mismatch */
121 info->ldapai_info_version = LDAP_API_INFO_VERSION;
122 return LDAP_OPT_ERROR;
125 info->ldapai_api_version = LDAP_API_VERSION;
126 info->ldapai_api_version = LDAP_API_VERSION;
127 info->ldapai_protocol_version = LDAP_VERSION_MAX;
129 if(features[0].ldapaif_name == NULL) {
130 info->ldapai_extensions = NULL;
133 info->ldapai_extensions = LDAP_MALLOC(sizeof(char *) *
134 sizeof(features)/sizeof(LDAPAPIFeatureInfo));
136 for(i=0; features[i].ldapaif_name != NULL; i++) {
137 info->ldapai_extensions[i] =
138 LDAP_STRDUP(features[i].ldapaif_name);
141 info->ldapai_extensions[i] = NULL;
144 info->ldapai_vendor_name = LDAP_STRDUP(LDAP_VENDOR_NAME);
145 info->ldapai_vendor_version = LDAP_VENDOR_VERSION;
147 return LDAP_OPT_SUCCESS;
151 if( ld == NULL || ld->ld_sb == NULL ) {
156 ber_sockbuf_ctrl( ld->ld_sb, LBER_SB_OPT_GET_FD, outvalue );
157 return LDAP_OPT_SUCCESS;
159 case LDAP_OPT_TIMEOUT:
160 /* the caller has to free outvalue ! */
161 if ( ldap_int_timeval_dup( outvalue, lo->ldo_tm_api) != 0 )
163 return LDAP_OPT_ERROR;
165 return LDAP_OPT_SUCCESS;
167 case LDAP_OPT_NETWORK_TIMEOUT:
168 /* the caller has to free outvalue ! */
169 if ( ldap_int_timeval_dup( outvalue, lo->ldo_tm_net ) != 0 )
171 return LDAP_OPT_ERROR;
173 return LDAP_OPT_SUCCESS;
176 * (int *) outvalue = lo->ldo_deref;
177 return LDAP_OPT_SUCCESS;
179 case LDAP_OPT_SIZELIMIT:
180 * (int *) outvalue = lo->ldo_sizelimit;
181 return LDAP_OPT_SUCCESS;
183 case LDAP_OPT_TIMELIMIT:
184 * (int *) outvalue = lo->ldo_timelimit;
185 return LDAP_OPT_SUCCESS;
187 case LDAP_OPT_REFERRALS:
188 * (int *) outvalue = (int) LDAP_BOOL_GET(lo, LDAP_BOOL_REFERRALS);
189 return LDAP_OPT_SUCCESS;
191 case LDAP_OPT_RESTART:
192 * (int *) outvalue = (int) LDAP_BOOL_GET(lo, LDAP_BOOL_RESTART);
193 return LDAP_OPT_SUCCESS;
195 case LDAP_OPT_PROTOCOL_VERSION:
196 * (int *) outvalue = lo->ldo_version;
197 return LDAP_OPT_SUCCESS;
199 case LDAP_OPT_SERVER_CONTROLS:
200 * (LDAPControl ***) outvalue =
201 ldap_controls_dup( lo->ldo_sctrls );
203 return LDAP_OPT_SUCCESS;
205 case LDAP_OPT_CLIENT_CONTROLS:
206 * (LDAPControl ***) outvalue =
207 ldap_controls_dup( lo->ldo_cctrls );
209 return LDAP_OPT_SUCCESS;
211 case LDAP_OPT_HOST_NAME:
212 * (char **) outvalue = ldap_url_list2hosts(lo->ldo_defludp);
213 return LDAP_OPT_SUCCESS;
216 * (char **) outvalue = ldap_url_list2urls(lo->ldo_defludp);
217 return LDAP_OPT_SUCCESS;
219 case LDAP_OPT_ERROR_NUMBER:
224 * (int *) outvalue = ld->ld_errno;
225 return LDAP_OPT_SUCCESS;
227 case LDAP_OPT_ERROR_STRING:
233 if( ld->ld_error == NULL ) {
234 * (char **) outvalue = NULL;
236 * (char **) outvalue = LDAP_STRDUP(ld->ld_error);
239 return LDAP_OPT_SUCCESS;
241 case LDAP_OPT_MATCHED_DN:
247 if( ld->ld_matched == NULL ) {
248 * (char **) outvalue = NULL;
250 * (char **) outvalue = LDAP_STRDUP(ld->ld_matched);
253 return LDAP_OPT_SUCCESS;
255 case LDAP_OPT_API_FEATURE_INFO: {
256 LDAPAPIFeatureInfo *info = (LDAPAPIFeatureInfo *) outvalue;
259 if(info == NULL) return LDAP_OPT_ERROR;
261 if(info->ldapaif_info_version != LDAP_FEATURE_INFO_VERSION) {
262 /* api info version mismatch */
263 info->ldapaif_info_version = LDAP_FEATURE_INFO_VERSION;
264 return LDAP_OPT_ERROR;
267 if(info->ldapaif_name == NULL) return LDAP_OPT_ERROR;
269 for(i=0; features[i].ldapaif_name != NULL; i++) {
270 if(!strcmp(info->ldapaif_name, features[i].ldapaif_name)) {
271 info->ldapaif_version =
272 features[i].ldapaif_version;
273 return LDAP_OPT_SUCCESS;
279 case LDAP_OPT_DEBUG_LEVEL:
280 * (int *) outvalue = lo->ldo_debug;
281 return LDAP_OPT_SUCCESS;
285 if ( ldap_pvt_tls_get_option((struct ldapoptions *)lo, option, outvalue ) == 0 )
286 return LDAP_OPT_SUCCESS;
288 #ifdef HAVE_CYRUS_SASL
289 if ( ldap_int_sasl_get_option(ld, option, outvalue ) == 0 )
290 return LDAP_OPT_SUCCESS;
296 return LDAP_OPT_ERROR;
303 LDAP_CONST void *invalue)
305 struct ldapoptions *lo;
308 /* Get pointer to global option structure */
309 lo = LDAP_INT_GLOBAL_OPT();
311 return LDAP_NO_MEMORY;
315 * The architecture to turn on debugging has a chicken and egg
316 * problem. Thus, we introduce a fix here.
319 if (option == LDAP_OPT_DEBUG_LEVEL)
320 dbglvl = (int *) invalue;
322 if( lo->ldo_valid != LDAP_INITIALIZED ) {
323 ldap_int_initialize(lo, dbglvl);
327 assert( LDAP_VALID( ld ) );
329 if( !LDAP_VALID( ld ) ) {
330 return LDAP_OPT_ERROR;
333 lo = &ld->ld_options;
337 case LDAP_OPT_REFERRALS:
338 if(invalue == LDAP_OPT_OFF) {
339 LDAP_BOOL_CLR(lo, LDAP_BOOL_REFERRALS);
341 LDAP_BOOL_SET(lo, LDAP_BOOL_REFERRALS);
343 return LDAP_OPT_SUCCESS;
345 case LDAP_OPT_RESTART:
346 if(invalue == LDAP_OPT_OFF) {
347 LDAP_BOOL_CLR(lo, LDAP_BOOL_RESTART);
349 LDAP_BOOL_SET(lo, LDAP_BOOL_RESTART);
351 return LDAP_OPT_SUCCESS;
354 /* options which can withstand invalue == NULL */
356 case LDAP_OPT_SERVER_CONTROLS: {
357 LDAPControl *const *controls =
358 (LDAPControl *const *) invalue;
360 ldap_controls_free( lo->ldo_sctrls );
362 if( controls == NULL || *controls == NULL ) {
363 lo->ldo_sctrls = NULL;
364 return LDAP_OPT_SUCCESS;
367 lo->ldo_sctrls = ldap_controls_dup( controls );
369 if(lo->ldo_sctrls == NULL) {
370 /* memory allocation error ? */
373 } return LDAP_OPT_SUCCESS;
375 case LDAP_OPT_CLIENT_CONTROLS: {
376 LDAPControl *const *controls =
377 (LDAPControl *const *) invalue;
379 ldap_controls_free( lo->ldo_cctrls );
381 if( controls == NULL || *controls == NULL ) {
382 lo->ldo_cctrls = NULL;
383 return LDAP_OPT_SUCCESS;
386 lo->ldo_cctrls = ldap_controls_dup( controls );
388 if(lo->ldo_cctrls == NULL) {
389 /* memory allocation error ? */
392 } return LDAP_OPT_SUCCESS;
394 case LDAP_OPT_TIMEOUT: {
395 const struct timeval *tv =
396 (const struct timeval *) invalue;
398 if ( lo->ldo_tm_api != NULL ) {
399 LDAP_FREE( lo->ldo_tm_api );
400 lo->ldo_tm_api = NULL;
403 if ( ldap_int_timeval_dup( &lo->ldo_tm_api, tv ) != 0 ) {
404 return LDAP_OPT_ERROR;
406 } return LDAP_OPT_SUCCESS;
408 case LDAP_OPT_NETWORK_TIMEOUT: {
409 const struct timeval *tv =
410 (const struct timeval *) invalue;
412 if ( lo->ldo_tm_net != NULL ) {
413 LDAP_FREE( lo->ldo_tm_net );
414 lo->ldo_tm_net = NULL;
417 if ( ldap_int_timeval_dup( &lo->ldo_tm_net, tv ) != 0 ) {
418 return LDAP_OPT_ERROR;
420 } return LDAP_OPT_SUCCESS;
422 /* Only accessed from inside this function by ldap_set_rebind_proc() */
423 case LDAP_OPT_REBIND_PROC: {
424 lo->ldo_rebind_proc = (LDAP_REBIND_PROC *)invalue;
425 } return LDAP_OPT_SUCCESS;
426 case LDAP_OPT_REBIND_PARAMS: {
427 lo->ldo_rebind_params = (void *)invalue;
428 } return LDAP_OPT_SUCCESS;
431 if(invalue == NULL) {
432 /* no place to set from */
433 return LDAP_OPT_ERROR;
436 /* options which cannot withstand invalue == NULL */
439 case LDAP_OPT_API_INFO:
445 lo->ldo_deref = * (const int *) invalue;
446 return LDAP_OPT_SUCCESS;
448 case LDAP_OPT_SIZELIMIT:
449 lo->ldo_sizelimit = * (const int *) invalue;
450 return LDAP_OPT_SUCCESS;
452 case LDAP_OPT_TIMELIMIT:
453 lo->ldo_timelimit = * (const int *) invalue;
454 return LDAP_OPT_SUCCESS;
456 case LDAP_OPT_PROTOCOL_VERSION: {
457 int vers = * (const int *) invalue;
458 if (vers < LDAP_VERSION_MIN || vers > LDAP_VERSION_MAX) {
462 lo->ldo_version = vers;
463 } return LDAP_OPT_SUCCESS;
466 case LDAP_OPT_HOST_NAME: {
467 const char *host = (const char *) invalue;
468 LDAPURLDesc *ludlist = NULL;
469 int rc = LDAP_OPT_SUCCESS;
472 rc = ldap_url_parsehosts( &ludlist, host,
473 lo->ldo_defport ? lo->ldo_defport : LDAP_PORT );
475 } else if(ld == NULL) {
477 * must want global default returned
478 * to initial condition.
480 rc = ldap_url_parselist(&ludlist, "ldap://localhost/");
484 * must want the session default
485 * updated to the current global default
487 ludlist = ldap_url_duplist(
488 ldap_int_global_options.ldo_defludp);
493 if (rc == LDAP_OPT_SUCCESS) {
494 if (lo->ldo_defludp != NULL)
495 ldap_free_urllist(lo->ldo_defludp);
496 lo->ldo_defludp = ludlist;
502 const char *urls = (const char *) invalue;
503 LDAPURLDesc *ludlist = NULL;
504 int rc = LDAP_OPT_SUCCESS;
507 rc = ldap_url_parselist(&ludlist, urls);
509 } else if(ld == NULL) {
511 * must want global default returned
512 * to initial condition.
514 rc = ldap_url_parselist(&ludlist, "ldap://localhost/");
518 * must want the session default
519 * updated to the current global default
521 ludlist = ldap_url_duplist(
522 ldap_int_global_options.ldo_defludp);
527 if (rc == LDAP_OPT_SUCCESS) {
528 if (lo->ldo_defludp != NULL)
529 ldap_free_urllist(lo->ldo_defludp);
530 lo->ldo_defludp = ludlist;
535 case LDAP_OPT_ERROR_NUMBER: {
536 int err = * (const int *) invalue;
539 /* need a struct ldap */
544 } return LDAP_OPT_SUCCESS;
546 case LDAP_OPT_ERROR_STRING: {
547 const char *err = (const char *) invalue;
550 /* need a struct ldap */
555 LDAP_FREE(ld->ld_error);
558 ld->ld_error = LDAP_STRDUP(err);
559 } return LDAP_OPT_SUCCESS;
561 case LDAP_OPT_MATCHED_DN: {
562 const char *err = (const char *) invalue;
565 /* need a struct ldap */
569 if( ld->ld_matched ) {
570 LDAP_FREE(ld->ld_matched);
573 ld->ld_matched = LDAP_STRDUP(err);
574 } return LDAP_OPT_SUCCESS;
576 case LDAP_OPT_API_FEATURE_INFO:
580 case LDAP_OPT_DEBUG_LEVEL:
581 lo->ldo_debug = * (const int *) invalue;
582 return LDAP_OPT_SUCCESS;
586 if ( ldap_pvt_tls_set_option( lo, option, (void *)invalue ) == 0 )
587 return LDAP_OPT_SUCCESS;
589 #ifdef HAVE_CYRUS_SASL
590 if ( ldap_int_sasl_set_option( ld, option, (void *)invalue ) == 0 )
591 return LDAP_OPT_SUCCESS;
596 return LDAP_OPT_ERROR;
600 ldap_set_rebind_proc( LDAP *ld, LDAP_REBIND_PROC *proc, void *params )
603 rc = ldap_set_option( ld, LDAP_OPT_REBIND_PROC, (void *)proc );
604 if( rc != LDAP_OPT_SUCCESS ) return rc;
606 rc = ldap_set_option( ld, LDAP_OPT_REBIND_PARAMS, (void *)params );